Overview
Remote
Depends on Experience
Contract - W2
Contract - Independent
Contract - 12 Month(s)
Skills
Collaboration
Communication
Cyber Security
DNS
Documentation
Dragon NaturallySpeaking
FedRAMP
Firewall
GCIA
GCIH
GSEC
ISO/IEC 27001:2005
Incident Management
NIST 800-53
Proxies
Python
Recovery
Regulatory Compliance
SIEM
Scripting
Security Clearance
Security Engineering
Security Operations
Security+
Threat Analysis
Windows PowerShell
Job Details
Role: Security Engineer
Location: Remote for Non-local within DMV (but 4 days on-site for candidates local to Reston, VA)
Duration: Long Term Contract
Clearance: Able to obtain MBI Clearance
Job Summary:
Looking for a Security Analyst/Engineer to join our cybersecurity team. Key duties:
- Monitor systems for abnormal activity.
- Analyze alerts, distinguish threats from false positives, categorize incidents by risk.
- Lead incident response: containment, eradication, recovery, post-incident analysis, documenting steps.
- Optimize detection capabilities: refine alert thresholds, tune SIEM rules, integrate new data sources, reduce false positives.
- Compile weekly/monthly reports on incident trends, threat activity, and security posture for internal stakeholders.
- Actively participate in team meetings, threat intel reviews, and cross-departmental syncs.
Preferred Skills:
- Familiarity with scripting languages (e.g., Python,
- PowerShell) for automation.
- Exposure to threat intelligence tools and processes.
- Experience supporting compliance with standards such as NIST 800-53, ISO 27001, or FedRAMP.
- Certifications such as Security+, GSEC, GCIA, GCIH, or equivalent.
Required Skills:
At least 2 years of experience in a security operations or security engineering role.
- Hands-on experience with SIEM platforms (Sumo Logic preferred).
- Experience tuning and optimizing detection rules and alert thresholds in SIEM/EDR platforms.
- Working knowledge of endpoint detection and response (EDR) tools (Crowdstrike preferred).
- Familiarity with analyzing firewall, proxy, and DNS logs.
- Experience with incident response and handling escalated security alerts.
- Strong understanding of security event triage, analysis, and mitigation techniques.
- Excellent documentation, communication, and collaboration skills.
- Ability to work independently in a structured and proactive manner.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.